Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec10.bht:"
@article{DBLP:journals/compsec/Allen91, author = {R. J. Allen}, title = {Trusted {ORACLE} - multilevel secure data management for military computing}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {271--275}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90044-E}, doi = {10.1016/0167-4048(91)90044-E}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Allen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Banks91, author = {Simon Banks}, title = {Understanding IBM's {CICS} systems to improve security}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {205--212}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90035-C}, doi = {10.1016/0167-4048(91)90035-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Banks91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Baskerville91, author = {Richard L. Baskerville}, title = {Risk analysis as a source of professional knowledge}, journal = {Comput. Secur.}, volume = {10}, number = {8}, pages = {749--764}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90094-T}, doi = {10.1016/0167-4048(91)90094-T}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Baskerville91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bologna91, author = {Jack Bologna}, title = {A framework for the ethical analysis of information technologies}, journal = {Comput. Secur.}, volume = {10}, number = {4}, pages = {303--307}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90105-M}, doi = {10.1016/0167-4048(91)90105-M}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bologna91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Carr91, author = {J. Carr}, title = {Electronic data interchange - security risk or not?}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {69--72}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90057-K}, doi = {10.1016/0167-4048(91)90057-K}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Carr91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen91, author = {Frederick B. Cohen}, title = {A cost analysis of typical computer viruses and defenses}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {239--250}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90040-K}, doi = {10.1016/0167-4048(91)90040-K}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen91a, author = {Frederick B. Cohen}, title = {A note on high-integrity {PC} bootstrapping}, journal = {Comput. Secur.}, volume = {10}, number = {6}, pages = {535--539}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90079-S}, doi = {10.1016/0167-4048(91)90079-S}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen91b, author = {Frederick B. Cohen}, title = {A DOS-based \emph{POset} implementation}, journal = {Comput. Secur.}, volume = {10}, number = {6}, pages = {541--551}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90080-W}, doi = {10.1016/0167-4048(91)90080-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen91b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CoomaraswamyKM91, author = {Gnanesh Coomaraswamy and Srikanta P. R. Kumar and Michel E. Marhic}, title = {Fiber-optic {LAN/WAN} systems to support confidential communication}, journal = {Comput. Secur.}, volume = {10}, number = {8}, pages = {765--776}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90095-U}, doi = {10.1016/0167-4048(91)90095-U}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CoomaraswamyKM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Domingo-Ferrer91, author = {Josep Domingo{-}Ferrer}, title = {Algorithm- sequenced access control}, journal = {Comput. Secur.}, volume = {10}, number = {7}, pages = {639--652}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90122-T}, doi = {10.1016/0167-4048(91)90122-T}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Domingo-Ferrer91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Evans91, author = {Paul Evans}, title = {Computer fraud - The situation, detection and training}, journal = {Comput. Secur.}, volume = {10}, number = {4}, pages = {325--327}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90107-O}, doi = {10.1016/0167-4048(91)90107-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Evans91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Fak91, author = {Viiveke F{\aa}k}, title = {Computer verification of human users' identity: {A} theoretical model and some evaluation criteria}, journal = {Comput. Secur.}, volume = {10}, number = {7}, pages = {626--636}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90120-3}, doi = {10.1016/0167-4048(91)90120-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Fak91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Farquhar91, author = {Bill Farquhar}, title = {One approach to risk assessment}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {21--23}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90051-E}, doi = {10.1016/0167-4048(91)90051-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Farquhar91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GoyalS91, author = {M. L. Goyal and G. V. Singh}, title = {Access control in distributed heterogeneous database management systems}, journal = {Comput. Secur.}, volume = {10}, number = {7}, pages = {661--669}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90124-V}, doi = {10.1016/0167-4048(91)90124-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GoyalS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisTKK91, author = {Dimitris Gritzalis and A. Tomaras and Sokratis K. Katsikas and J. Keklikoglou}, title = {Data security in medical information systems: The Greek case}, journal = {Comput. Secur.}, volume = {10}, number = {2}, pages = {141--159}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90008-2}, doi = {10.1016/0167-4048(91)90008-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisTKK91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {4--16}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91a, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {10}, number = {2}, pages = {92--100}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91b, author = {Harold Joseph Highland}, title = {A non-mathematical view of encryption}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {184--188}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91c, author = {Harold Joseph Highland}, title = {Evaluating an encryption package}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {189--190}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91d, author = {Harold Joseph Highland}, title = {Computers under attack}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {190--191}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91e, author = {Harold Joseph Highland}, title = {Microcomputer utilities}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {191--195}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91f, author = {Harold Joseph Highland}, title = {{NTIS} volumes of interest}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {195--198}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91g, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {10}, number = {5}, pages = {384--397}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90064-K}, doi = {10.1016/0167-4048(91)90064-K}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91h, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {10}, number = {6}, pages = {486--495}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91i, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {10}, number = {7}, pages = {586--600}, year = {1991}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland91j, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {10}, number = {8}, pages = {690--699}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90088-U}, doi = {10.1016/0167-4048(91)90088-U}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland91j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hiles91, author = {Andrew Hiles}, title = {Computer fire risks}, journal = {Comput. Secur.}, volume = {10}, number = {4}, pages = {299--302}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90104-L}, doi = {10.1016/0167-4048(91)90104-L}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hiles91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JanCW91, author = {Jinn{-}Ke Jan and Chin{-}Chen Chang and S. J. Wang}, title = {A dynamic key-lock-pair access control scheme}, journal = {Comput. Secur.}, volume = {10}, number = {2}, pages = {129--139}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90007-Z}, doi = {10.1016/0167-4048(91)90007-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JanCW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kowalski91, author = {Stewart Kowalski}, title = {The ABCs and Es of national computer security policies}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {213--216}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90036-D}, doi = {10.1016/0167-4048(91)90036-D}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kowalski91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kowalski91a, author = {Stewart Kowalski}, title = {Cybernetic analysis of national computer security}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {217--227}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90037-E}, doi = {10.1016/0167-4048(91)90037-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kowalski91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kowalski91b, author = {Stewart Kowalski}, title = {Cybernetic analysis of the 12th {U.S.} National Computer Security Conference}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {228--235}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90038-F}, doi = {10.1016/0167-4048(91)90038-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kowalski91b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kruys91, author = {Jan Kruys}, title = {Progress in secure distributed systems}, journal = {Comput. Secur.}, volume = {10}, number = {5}, pages = {429--441}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90069-P}, doi = {10.1016/0167-4048(91)90069-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kruys91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Laferriere91, author = {Claude Laferriere}, title = {Predicate based polyinstantiation in multi-level secure {DBMS}}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {41--49}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90055-I}, doi = {10.1016/0167-4048(91)90055-I}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Laferriere91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LaurichesseB91, author = {Denis Laurichesse and Laurent Blain}, title = {Optimized implementation of {RSA} cryptosystem}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {263--267}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90042-C}, doi = {10.1016/0167-4048(91)90042-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LaurichesseB91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lynch91, author = {Paul Lynch}, title = {Beyond {RACF:} Extending user authentication controls}, journal = {Comput. Secur.}, volume = {10}, number = {8}, pages = {711--722}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90090-Z}, doi = {10.1016/0167-4048(91)90090-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lynch91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus91, author = {Belden Menkus}, title = {How to begin dealing with computer security}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {199--203}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90034-B}, doi = {10.1016/0167-4048(91)90034-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus91a, author = {Belden Menkus}, title = {"Control" is fundamental to successful information security}, journal = {Comput. Secur.}, volume = {10}, number = {4}, pages = {293--297}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90103-K}, doi = {10.1016/0167-4048(91)90103-K}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus91b, author = {Belden Menkus}, title = {"Hackers": Know the adversary}, journal = {Comput. Secur.}, volume = {10}, number = {5}, pages = {405--409}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90066-M}, doi = {10.1016/0167-4048(91)90066-M}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Menkus91b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitchellV91, author = {Chris J. Mitchell and Vijay Varadharajan}, title = {Modified forms of cipher block chaining}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {37--40}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90054-H}, doi = {10.1016/0167-4048(91)90054-H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MitchellV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NurmiSS91, author = {Hannu Nurmi and Arto Salomaa and Lila Santean}, title = {Secret ballot elections in computer networks}, journal = {Comput. Secur.}, volume = {10}, number = {6}, pages = {553--560}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90081-N}, doi = {10.1016/0167-4048(91)90081-N}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NurmiSS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OShea91, author = {G. F. G. O'Shea}, title = {Operating system integrity}, journal = {Comput. Secur.}, volume = {10}, number = {5}, pages = {443--465}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90070-T}, doi = {10.1016/0167-4048(91)90070-T}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OShea91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Paans91, author = {Ronald Paans}, title = {With {MVS/ESA} security labels towards {B1}}, journal = {Comput. Secur.}, volume = {10}, number = {4}, pages = {309--324}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90106-N}, doi = {10.1016/0167-4048(91)90106-N}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Paans91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PaansL91, author = {Ronald Paans and Hans de Lange}, title = {Auditing the {SNA/SNI} environment}, journal = {Comput. Secur.}, volume = {10}, number = {3}, pages = {251--261}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90041-B}, doi = {10.1016/0167-4048(91)90041-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PaansL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Peach91, author = {S. Peach}, title = {Disaster recovery: An unnecessary cost burden or an essential feature of any {DP} installation?}, journal = {Comput. Secur.}, volume = {10}, number = {6}, pages = {565--568}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90084-Q}, doi = {10.1016/0167-4048(91)90084-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Peach91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pfleeger91, author = {Shari Lawrence Pfleeger}, title = {A framework for security requirements}, journal = {Comput. Secur.}, volume = {10}, number = {6}, pages = {515--523}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90076-P}, doi = {10.1016/0167-4048(91)90076-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pfleeger91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PostK91, author = {Gerald V. Post and Karen{-}Ann Kievit}, title = {Accessibility vs. security: {A} look at the demand for computer security}, journal = {Comput. Secur.}, volume = {10}, number = {4}, pages = {331--344}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90109-Q}, doi = {10.1016/0167-4048(91)90109-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PostK91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PottasS91, author = {Dalenca Pottas and Sebastiaan H. von Solms}, title = {A computerized management reporting aid for a mainframe security system}, journal = {Comput. Secur.}, volume = {10}, number = {7}, pages = {653--660}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90123-U}, doi = {10.1016/0167-4048(91)90123-U}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PottasS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Press91, author = {Jim Press}, title = {Secure transfer of identity and privilege attributes in an open systems environment}, journal = {Comput. Secur.}, volume = {10}, number = {2}, pages = {117--127}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90006-Y}, doi = {10.1016/0167-4048(91)90006-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Press91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Preston91, author = {Charles Preston}, title = {Creating a corporate virus plan}, journal = {Comput. Secur.}, volume = {10}, number = {8}, pages = {701--710}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90089-V}, doi = {10.1016/0167-4048(91)90089-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Preston91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Rihaczek91, author = {Karl Rihaczek}, title = {The harmonized {ITSEC} evaluation criteria}, journal = {Comput. Secur.}, volume = {10}, number = {2}, pages = {101--110}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90003-V}, doi = {10.1016/0167-4048(91)90003-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Rihaczek91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Robertson91, author = {Bernard Robertson}, title = {Electronic mail - Is is safe to use?}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {17--19}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90050-N}, doi = {10.1016/0167-4048(91)90050-N}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Robertson91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RosenthalH91, author = {Paul Herbert Rosenthal and Barry Himel}, title = {Business resumption planning: Exercising your emergency response teams}, journal = {Comput. Secur.}, volume = {10}, number = {6}, pages = {497--514}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90075-O}, doi = {10.1016/0167-4048(91)90075-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RosenthalH91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RushinekR91, author = {Avi Rushinek and Sara F. Rushinek}, title = {Data encryption features for computer hardware and software profitability: {I/O} ports, expansion slots, algorithms, cyphers and security}, journal = {Comput. Secur.}, volume = {10}, number = {4}, pages = {345--357}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90110-Y}, doi = {10.1016/0167-4048(91)90110-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RushinekR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SandhuJ91, author = {Ravi S. Sandhu and Sushil Jajodia}, title = {Integrity principles and mechanisms in database management systems}, journal = {Comput. Secur.}, volume = {10}, number = {5}, pages = {413--427}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90068-O}, doi = {10.1016/0167-4048(91)90068-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SandhuJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schramm91, author = {Christof Schramm}, title = {Computing centers undermine {MVS} security}, journal = {Comput. Secur.}, volume = {10}, number = {4}, pages = {359--370}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90111-P}, doi = {10.1016/0167-4048(91)90111-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schramm91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Sherizen91, author = {Sanford Sherizen}, title = {European unification '92 impacts on information security}, journal = {Comput. Secur.}, volume = {10}, number = {7}, pages = {601--610}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90117-V}, doi = {10.1016/0167-4048(91)90117-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Sherizen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Steinke91, author = {Gerhard Steinke}, title = {Design aspects of access control in a knowledge base system}, journal = {Comput. Secur.}, volume = {10}, number = {7}, pages = {612--625}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90119-X}, doi = {10.1016/0167-4048(91)90119-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Steinke91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TanakaO91, author = {Kazue Tanaka and Eiji Okamoto}, title = {Key distribution system for mail systems using ID-related information directory}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {25--33}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90052-F}, doi = {10.1016/0167-4048(91)90052-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TanakaO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Thimbleby91, author = {Harold W. Thimbleby}, title = {Can viruses ever be useful?}, journal = {Comput. Secur.}, volume = {10}, number = {2}, pages = {111--114}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90004-W}, doi = {10.1016/0167-4048(91)90004-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Thimbleby91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Thuraisingham91, author = {Bhavani Thuraisingham}, title = {Multilevel security issues in distributed database management systems {II}}, journal = {Comput. Secur.}, volume = {10}, number = {8}, pages = {727--747}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90093-S}, doi = {10.1016/0167-4048(91)90093-S}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Thuraisingham91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VaradharajanB91, author = {Vijay Varadharajan and Stewart Black}, title = {Multilevel security in a distributed object-oriented system}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {51--68}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90056-J}, doi = {10.1016/0167-4048(91)90056-J}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VaradharajanB91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood91, author = {Charles Cresson Wood}, title = {Using information security to achieve competitive advantage}, journal = {Comput. Secur.}, volume = {10}, number = {5}, pages = {399--404}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90065-L}, doi = {10.1016/0167-4048(91)90065-L}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood91a, author = {Charles Cresson Wood}, title = {Burning computer security, privacy, and freedom issues}, journal = {Comput. Secur.}, volume = {10}, number = {6}, pages = {524--532}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90077-Q}, doi = {10.1016/0167-4048(91)90077-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.